WoltLab(R) Community Framework XSS and Full Path Disclosure Vulnerability
- To: full-disclosure@xxxxxxxxxxxxxxxxx, bugtraq@xxxxxxxxxxxxxxxxx
- Subject: WoltLab(R) Community Framework XSS and Full Path Disclosure Vulnerability
- From: "Jessica Hope" <jessicasaulhope@xxxxxxxxxxxxxx>
- Date: Tue, 8 Apr 2008 00:21:32 +0100
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; bh=ypTj90HjIaCYKpLyk3YNRXqHGnKMgXTe8YnNQxv5bd4=; b=uOcg/ud2+oB1sWj0yxcOWnsj5W/sHj/ro7TRbJ7WuAD3FQgJhWD7GLZtCJFThneIK99gjNfOjiKP0sAeNICoKIEUVDCXby29QvCs8DkKJf6zl6MD+k4dKydzkJCrRZMFQizB925t8bFgMVXvMKJG0hcq8w5/EujuqCdY2lSVbgI=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=googlemail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=baJ63E/xiIjy9+QSN3PxOPWt5YVUZF8Ux5xQxyIqnkRQtwQYInw2MAhTIP3bSxr9esvM1rASy3FY31zNh5Q7kpXUYpn6q/7OMBrbIlYrGWe+GlAF/+XGli0jg444616GIgA9GkL/MmXf0Ld5ZWfWIp4+5edHqf1hnIRzL5ZHBQY=
- List-help: <mailto:bugtraq-help@securityfocus.com>
- List-id: <bugtraq.list-id.securityfocus.com>
- List-post: <mailto:bugtraq@securityfocus.com>
- List-subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
- List-unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
- Mailing-list: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
======================================================================
Advisory : WoltLab(R) Community Framework XSS and Full Path Disclosure
Vulnerability
Release Date :
Application : WoltLab(R) Community Framework
Version : WCF 1.0.6 and lower
Platform : PHP
Vendor URL : http://community.woltlab.com/
Authors : Jessica Hope ( jessicasaulhope@xxxxxxxxxxxxxx )
=======================================================================
Overview
Due to various failures in sanitising user input, it is possible to
construct XSS attacks and path disclosure.
=======================================================================
Discussion
Full Path Disclosure via "page", "form", etc. Parameters:
WCF based applications use a factory pattern to load and instantiate the class
appropriate for the current page based on user input. If the user submits data
not resolving to a valid class, the exception handler adds the whole stacktrace
- including the full path - into an HTML comment.
XSS via "page", "form", etc. Parameters:
The aforementioned trace includes the user submitted parameter as function
argument and is left un-escaped. This opens a potential XSS issue.
=======================================================================
Solution
At this time there is no vendor patch. Vendor in question lacks a public way to
contact them with relation to a security vulnerability.
The suggested solution is to not expose sensitive information (full paths) and
un-escaped user input in comments.
Vendor should also publish an e-mail address or other way to contact them with
such issues so that full-disclosure can be avoided before vendor notification.
Ongoing research into other products Woltlab GmbH produces is pending. Future
vulnerabilities will be posted to full disclosure as they are found unless the
vendor wishes to provide such contact info publicly.
=======================================================================
History:
08th April 2008: Full disclosure
=======================================================================
Credit
This issue is to be credited to Jessica Hope ( jessicasaulhope@xxxxxxxxxxxxxx )